Chapter 7 Crossword CEH

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 4. Malware changing behavior dynamically
  2. 5. Network traffic analysis tool
  3. 7. Attacker spreading across networks
  4. 10. Multiple layered security strategy
  5. 12. Compressing malware to hide code
  6. 13. Indicator showing compromise evidence
  7. 15. Malware operating primarily in memory
  8. 18. Infrastructure controlling infected systems
  9. 21. Isolated environment for safe execution
  10. 22. Windows executable file format
  11. 26. Detecting threats by activity patterns
  12. 27. Security model requiring verification
  13. 28. Malware requiring user execution to spread
  14. 29. macOS executable format
  15. 30. Linux executable format
  16. 32. Tool tracking system processes
  17. 33. Malware Malware using artificial intelligence techniques
  18. 34. Gaining higher system permissions
  19. 35. Examining malware without execution
  20. 37. Endpoint detection and response security
  21. 38. Secure hashing algorithm for identification
Down
  1. 1. Extended threat detection platform
  2. 2. Proactive search for attackers
  3. 3. Executing code inside running processes
  4. 6. Using system scripting tools maliciously
  5. 8. Small payload executed in memory
  6. 9. Command showing network connections
  7. 11. Social engineering used to deliver malware
  8. 12. Technique allowing malware survival after reboot
  9. 14. Startup registry location abused by malware
  10. 16. Dedicated malware inspection system
  11. 17. Converting binaries into assembly code
  12. 19. Software designed to damage systems or steal data
  13. 20. Studying malware behavior during execution
  14. 23. Making code difficult to analyze
  15. 24. Creating digital fingerprint of files
  16. 25. Self replicating malware spreading automatically
  17. 30. Code abusing system vulnerability
  18. 31. Automated execution used for persistence
  19. 36. Startup program monitoring utility